Professional Documents
Culture Documents
AbstractIn the area of medical applications, where traditional diagnosis is being replaced by e-diagnosis. This paradigm
gave birth to number of applications in healthcare industry like teleconsulting, telesurgery and telediagnosis. All
these applications require the exchange of medical images in digital format from one geographical location to
another throughout the globe via a cheap and fast network such as Internet. However, digital form of medical
image can easily be manipulated through image processing softwares. Insurance companies, hospitals as well
as patients might want to modify the medical images for a number of reasons. The tampered images may be
used for illegal purposes. This paper represents algorithms for Dual watermarks on medical image. Logo as
watermark first and Electronic Patient Record as second watermark. It save storage space, avoid detachments,
save network bandwidth etc. Results show that there will be increase in the accuracy of proposed system and
gives high PSNR value.
Index Terms- DWM (Digital Watermarking), EPR (Electronic Patient Record), MIW (Medical Image
Watermarking), DWT (Discrete wavelet transform)
1. INTRODUCTION
In relation to digital image watermarking, another
area that is drawing attention is the multiple
watermarking, where multiple watermarks are
embedded into single multimedia object [11].
Multiple watermarks are normally proposed as a
method to provide extra security to an image by
embedding two or more secret messages into the
cover image. The goals of such schemes are to
propose robust watermarking technique that has the
properties of confidentiality (only the entitled users
have access to the information), availability (ability of
an information system to be used in the normal
scheduled conditions of access) and reliability.
Reliability can be achieved based on Integrity (the
information has not been modified by unauthorized
people) and authenticity (act as a proof that the
information belongs to the correct person). Moreover,
the scheme should satisfy two conflicting
requirements. The first is that it must not introduce
any distortion in the host signal and secondly, the
watermark must be immune against intentional or
unintentional attacks or removals. Finally, the
proposed scheme must be efficient in terms of
transparency (the watermark is not visible in the
image under typical viewing conditions), capacity
(ability to detect watermarks with a low probability of
error as the number of
266
save network bandwidth etc. Results show that there will be increase in the accuracy of proposed system and
gives high PSNR value.
Index Terms- DWM (Digital Watermarking), EPR (Electronic Patient Record), MIW (Medical Image
Watermarking), DWT (Discrete wavelet transform)
E-ISSN: 2321-9637
1. INTRODUCTION
the image may not undergo any degradation that will
In
relation
to digital
image watermarking,
another
affect
the reading
of images.
Generally, images
are
area
that
is
drawing
attention
is
the
multiple
required to remain intact to achieve this, with no
watermarking,
multipleform.
watermarks are
visible alteration where
to their original
embedded
into
single
multimedia
[11].
A typical model for e-diagnosis is shownobject
in Fig.1.
In
Multiple
watermarks
are
normally
proposed
as
e-diagnosis environment a physician take a image ora
method
to provide
extra
security
to anbased
image
by
set of images,
perform
his own
diagnosis
on the
embedding
two embed
or more
messages
the
image and then
this secret
information
with into
the help
cover
image.
The goals
of the
suchimage
schemes
to
of some
embedding
tool in
alongarewith
propose
robust
watermarking
technique
that
has
the
patient's personal information such as name, age, and
properties
confidentiality
the entitled
users
sex etc. andofthen
stores it on (only
the database
containing
have
access
to
the
information),
availability
(ability
of
the patient historical data.
an information system to be used in the normal
scheduled conditions of access) and reliability.
Reliability can be achieved based on Integrity (the
information has not been modified by unauthorized
people) and authenticity (act as a proof that the
information belongs to the correct person). Moreover,
the scheme should satisfy two conflicting
requirements. The first is that it must not introduce
any distortion in the host signal and secondly, the
watermark must be immune against intentional or
unintentional attacks or removals. Finally, the
proposed scheme must be efficient in terms of
transparency (the watermark is not visible in the
image under typical viewing conditions), capacity
(ability to detect watermarks with a low probability of
error as the number of
267
3. FOUNDATIONS
METHEDOLOGY
3.1 .
OF
PROPOSED
268
Fig.4. A. Watermarked
Watermark.
Image.
Extracted
4. PROPOSED SYSYTEM
Wherein, x, y is the pixel coordinates of the original
space: x, y is the pixel coordinates after iterative
computation scrambling; N is the size of the
rectangular image, also referred to as a step number.
By the above formula the corresponding inverse
transform formula can be obtained [4].
269
5.
EXPERIMENTAL RESULTS
CT Scan
Imaging
512x512
0.2991
53.37db
MRI Imaging
512x512
0.1370
56.76db
270
REFERENCES
[1] Nasseer Moyasser Basheer and Shaimaa Salah
Abdulsalam. Digital image watermarking
algorithms in discrete wavelet transform domain
using hvs characteristics.
[2] Mohamed Ali Hajjaji, Abdellatif Mtibaa, El-Bey
Bourennane, et al. A watermarking of medical
image: Method basedlsb. International Journal
of Computer Science Issues, 2011.
[3] Jae-Woo Lee. A policy of copyright protection
using authentication key based on digital
watermarking.In Multimedia and Ubiquitous
Engineering, 2007. MUE07. International
Conference on, pages 12051209.IEEE, 2007.
[4] Jingbing Li and Sui Miao. The medical image
watermarking using arnold scrambling and dft.
[5] Fengmei Liang and Lijia WANG. An improved
wavelet-based color image watermark algorithm.
Journal of Computational Information Systems,
7(6):20132020, 2011.
[6] Rajesh
Kannan
Megalingam,
Mithun
Muralidharan Nair, Rahul Srikumar, Venkat
Krishnan Balasubramanian, and Vineeth Sarma
Venugopala Sarma. Performance comparison of
novel, robust spatial domain digital image
watermarking with the conventional frequency
domain watermarking techniques. In Signal
Acquisition and Processing, 2010. ICSAP10.
International Conference on, pages 349353.
IEEE, 2010.
[7] Salwa AK Mostafa, Naser El-sheimy, AS Tolba,
FM Abdelkader, and
M Elhindy. Wavelet
packets-based blind watermarking for medical
image management. The open biomedical
engineering journal, 4:93, 2010.
[8] KA Navas and M Sasikumar. Survey of medical
image watermarking algorithms. In Proc.
International Conf. Sciences of Electronics,
Technologies
of
Information
and
Telecommunications, pages 2529, 2007.
[9] Remya Elizabeth Philip and MG Sumithra.
Development of a new watermarking algorithm
for telemedicine applications. Development,
3(1):962968, 2013.
[10] B Planitz and A Maeder. Medical image
watermarking: A study on image degradation. In
Proc. Australian Pattern Recognition Society
Workshop on Digital Image Computing, WDIC,
2005.
[11] Hong Shen and Bo Chen. From single watermark
to dual watermark: A new approach for image
watermarking.
Computers
&
Electrical
Engineering, 38(5):13101324, 2012.
[12] Hamid Shojanazeri, Wan Azizun Wan Adnan,
Sharifah Mumtadzah Syed Ahmad, and M Iqbal
271
272